An Application-Based Tool That Contains Both an Enhanced Password Generator and a Password Strength Checker

Hazam Hamood Al-ZakwaniDepartment of Information Technology, University of Technology and Applied Sciences – Ibra, Sultanate of OmanDr. Ramesh PalanisamyDepartment of Information Technology, University of Technology and Applied Sciences – Ibra, Sultanate of Oman

Vol 7 No 12 (2023): Volume 7, Issue 12, December 2023 | Pages: 203-208

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 26-12-2023

doi Logo doi.org/10.47001/IRJIET/2023.712028

Abstract

The most common user authentication method for restricted resource access has been passwords. The fundamental problem with passwords is their strength or quality, or how easily or difficult they can be "guessed" by an outsider wishing to gain access to a resource you have access to by impersonating you. In this article, we examine multiple metrics related to password quality, one of which we have also suggested, and evaluate their advantages, disadvantages, and connections. We also experimented with cracking a series of passwords of varying complexity. The results of the experiments show that the quality of the passwords and their guess ability are positively correlated. 

Keywords

Password Strength Checker, Enhanced Password Generator, Python Tool, Password Security, Password Complexity, Weak Passwords, Strong Passwords


Citation of this Article

Hazam Hamood Al-Zakwani, Dr. Ramesh Palanisamy, “An Application-Based Tool That Contains Both an Enhanced Password Generator and a Password Strength Checker” Published in International Research Journal of Innovations in Engineering and Technology - IRJIET, Volume 7, Issue 12, pp 203-208, December 2023. Article DOI https://doi.org/10.47001/IRJIET/2023.712028

References
  1. Huang, C.; Chen, S.; Zhang, Y.; Zhou, W.; Rodrigues, J.J.; de Albuquerque, V.H.C. A robust approach for privacy data protection: IoT security assurance using generative adversarial imitation learning. IEEE Internet Things J. 2021, 9, 17089–17097.
  2. Li, H.; Yu, L.; He, W. The impact of GDPR on global technology development. J. Glob. Inform. Technol. Manag. 2019, 22, 1–6.
  3. Kloza, D.; Van Dijk, N.; Casiraghi, S.; Vazquez Maymir, S.; Roda, S.; Tanas, A.; Konstantinou, I. Towards a method for data protection impact assessment: Making sense of GDPR requirements. Policy Brief D. Pia. Lab 2019, 1, 1–8.
  4. Haghshenas, S.H.; Hasnat, M.A.; Naeini, M. A temporal graph neural network for cyber attack detection and localization in smart grids. In Proceedings of the 2023 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 16–19 January 2023.
  5. Inayat, U.; Zia, M.F.; Mahmood, S.; Khalid, H.M.; Benbouzid, M. Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects. Electronics 2022, 11, 1502.
  6. Rastenis, J.; Ramanauskaite, S.; Suzdalev, I.; Tunaityte, K.; Januleviˇcius, J.; ˙ Cenys, A. Multi-Language spam/Phishing classification ˇby Email Body text: Toward automated security Incident investigation. Electronics 2021, 10, 668.
  7. Ceponis, D.; Goranin, N. Investigation of dual-flow deep learning models LSTM-FCN and GRU-FCN efficiency against single-flow ˇCNN models for the host-based intrusion and malware detection task on univariate times series data. Appl. Sci. 2021, 10, 2373.
  8. Hughes-Lartey, K.; Li, M.; Botchey, F.E.; Qin, Z. Human factor, a critical weak point in the information security of an organization’s Internet of things. Heliyon 2021, 7, e06522.
  9. Lal, N.A.; Prasad, S.; Farik, M. A review of authentication methods. Int. J. Sci. Technol. Res. 2016, 5, 246–249.
  10. Yang, W.; Wang, S.; Hu, J.; Zheng, G.; Valli, C. Security and accuracy of fingerprint-based biometrics: A review. Symmetry 2019, 11, 141.
  11. Gwyn, T.; Roy, K.; Atay, M. Face recognition using popular deep net architectures: A brief comparative study. Fut. Internet 2021, 13, 164.
  12. Mehrubeoglu, M.; Nguyen, V. Real-time eye tracking for password authentication. In Proceedings of the 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 12–14 January 2018.
  13. Mahesh, T.R.; Ram, M.S.; Ram, N.S.S.; Gowtham, A.; Swamy, T.N. Real-Time Eye Blinking for Password Authentication. In Proceedings of the International Conference on Intelligent Emerging Methods of Artificial Intelligence & Cloud Computing: Proceedings of IEMAICLOUD 2021, online, 26–29 April 2021.
  14. Juozapaviˇcius, A.; Brilingaite, A.; Bukauskas, L.; Lugo, R.G. Age and Gender Impact on Password Hygiene. ˙ Appl. Sci. 2022, 12,894.
  15. Li, Y.; Liu, Q. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Rep. 2021, 7, 8176–8186.
  16. Awad, M.; Al-Qudah, Z.; Idwan, S.; Jallad, A.H. Password security: Password behavior analysis at a small university. In Proceedings of the 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), Ras Al Khaimah, United Arab Emirates, 6–8 December 2016.
  17. Katsini, C.; Fidas, C.; Raptis, G.E.; Belk, M.; Samaras, G.; Avouris, N. Influences of human cognition and visual behavior onpassword strength during picture password composition. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, Palais des Congrès de Montréal, Canada, 21–26 April 2018.
  18. Ur, B.; Segreti, S.M.; Bauer, L.; Christin, N.; Cranor, L.F.; Komanduri, S.; Kurilova, D.; Mazurek, M.L.; Melicher, W.; Shay, R.; et al. Measuring real-world accuracies and biases in modeling password guess ability. In Proceedings of the 24th {USENIX} Security Symposium ({USENIX} Security 15), Washington, DC, USA, 12–14 August 2015.
  19. Golla, M.; Dürmuth, M. On the Accuracy of Password Strength Meters. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 15–19 October 2018.
  20. Wheeler, D.L. zxcvbn: Low-Budget Password Strength Estimation. In Proceedings of the 25th USENIX Security, Austin, TX, USA, 10–12 August 2016.
  21. Doucek, P.; Pavlíˇcek, L.; Sedláˇcek, J.; Nedomová, L. Adaptation of password strength estimators to a non-english environment the Czech experience. Comput. Secur. 2020, 95, 101757.
  22. Hong, K.H.; Kang, U.G.; Lee, B.M. Enhanced Evaluation Model of Security Strength for Passwords Using Integrated Korean and English Password Dictionaries. Secur. Communicat. Netw. 2021, 2021, 3122627.
  23. Python program to check password strength. (2023, May 13). W3resource. https://www.w3resource.com/python-exercises/cybersecurity/python-cybersecurity-exercise-3.php
  24. Python program to check the validity of a Password. (2017, December 20). Geeks for Geeks. https://www.geeksforgeeks.org/python-program-check-validity-password/
  25. Password strength. (2020, March 21). Wikipedia. https://en.wikipedia.org/wiki/Password_strength